Sandbox
Sandbox
By Shripad Pulujkar
Introduction
Every day one start using computer virus infection becomes the issue of concern. User is always left worried about security of his crucial & confidential data. Antivirus software currently available are particularly suitable for detecting & eliminating known viruses only. This tradition concept becomes less effective as it doesnt do anything about new threats. Encrypted viruses are also a major headache as they are not detectable by traditional antivirus software.
Introduction
The only product that can defend us against such security threats is the product having sanboxing capabilities. Sandbox uses the general concept of running more than one operating systems in a single environment.
Virus
A virus is a malicious program that can affect the other non-malicious programs by modifying them. A virus infects a program by attaching itself to that program & thus the infected program then acts as a virus itself & infects other nonmalicious programs.
Trojan Horse
Trojan horse is not actually a virus as it does not affect our non-malicious programs but opens gate for other computer viruses to affect our system. Most of the time it works as a spyware which collects information about our computing & browsing habits which may include our account password or credit card no. & uses it for non-ethical purpose.
Worms
Worm works exactly as virus infecting our nonmalicious programs & then turning them in to worm itself. The only difference between worm & virus is worm can only spread on network while virus can spread through any medium.
Active Content
Active content refers to a software component that are embedded in an electronic document which can trigger actions automatically often without users approval or even knowledge. Active content can be delivered to users computer while browsing web, enabling websites to provide increased functionality such as website toolbar or browser plug-ins etc.
Active Content
Active contents can be delivered also via email, instant messaging & other means of communication on internet. Active content technology includes: Java applets, Java scripts, visual basic scripts, ActiveX controls etc.
Digital signature
Digital signature is an electronic signature that is used to authenticate the identity of the sender message or file & ensures the document which has been sent is unchanged. A digital signature can be used with email messages, so that the receiver can be sure of senders identity & message arrived is not infected.
Virus detection
This is the most common method used against the different virus attacks & traditional antivirus softwares are used for virus detection. Each antivirus software has his own virus database & suspicious files are compared with this database.
Virus detection
The problem with this method is that even the most advanced antivirus companies requires some time to capture & examine a virus & write its signature so that customers antivirus software can detect it. Also this signature needs to be distributed to customers so that their software will recognize the new threat. This process creates time lag between detection & protection which is enough to cause a serious damage.
What is sandbox?
Sandboxing is simply a security concept; a sandbox is a sealed container, which allows un-trusted programs to execute. Essentially, programs can only plays within the sandbox. Sanboxing is where we can take suspicious code & run it in a virtual environment (secured from the rest of the system) in order to see exactly how the code works & what is its purpose.
What is sandbox?
It allows us to run malicious code in protected environment so that code cant harm our data. Sandbox can protect our system against unknown threats as it can be used to detect the behaviour of the program.
Components of Sandbox
The application that is to be executed Sandbox it self which provides restrictive access Sandbox manager System resources those malicious codes will try to access.
Working of Sandbox
Sandbox works in its own simulated operating system & capable of emulating any operating system including DOS & windows. The advantage of simulating multiple operating systems is that it allows to catch viruses on different platforms.
Working of sandbox
Supports for more than 3000 different APIs Multithread support Support for thread injection to remote processes Detection of E-mail harvesting
Improved network support Support for threats through instant messaging communication.
The Day-Zero attack is an attack that takes place on very same day as program has been identified as security threat. In such situation, if wait for the creation and distribution of this latest virus signature files. By that time it may be too late for many organizations to avoid getting infected.
It leaves networks vulnerable and unprotected until they can distribute the required detection files to get the virus protection back on track. This can cause tremendous damage and heavy expenses to the corporation. Sandbox can become best solution in such situation. As we can execute the suspicious file in virtual environment provided by sandbox & monitor its behavior.
Based on the analysis, the system will determine whether to quarantine the file or to allow the file to enter the computer itself. Doing this on a real system can hardly be a feasible solution. To be able to do this within an acceptable time frame and with efficient system resources, a separate module (Sandbox) with its own operating system is needed.
Conclusion
It is the only effective technology till date which can protect against latest or even unknown threats. Better than most advanced antivirus softwares. Sandbox can act as a safety net to catch attacks that slip through main anti virus program and other protections.
THANK YOU.